2017 © Pedro Peláez
 

simplesamlphp-module simplesamlphp-module-attributeaggregator

Attribute Aggregator implementation or SAML AttributeQuery

image

niif/simplesamlphp-module-attributeaggregator

Attribute Aggregator implementation or SAML AttributeQuery

  • Tuesday, April 17, 2018
  • by gyufi
  • Repository
  • 3 Watchers
  • 4 Stars
  • 526 Installations
  • PHP
  • 0 Dependents
  • 0 Suggesters
  • 4 Forks
  • 1 Open issues
  • 13 Versions
  • 5 % Grown

The README.md

Attribute Aggregator module

Latest Stable Version Total Downloads Travis, (*1)

The Attribute Aggregator module is implemented as an Authentication Processing Filter. It can be configured in the SP's config.php file., (*2)

It is recommended to run the Attribute Aggregator module at the SP and configure the filter to run after the federated id, usually eduPersonPrincipalName is resolved., (*3)

Install

You can install the module with composer:, (*4)

composer require niif/simplesamlphp-module-attributeaggregator

How to setup the attributeaggregator module

The only required option of the module is the entityId of the Attribute Authority to be queried. The AA must support urn:oasis:names:tc:SAML:2.0:bindings:SOAP binding., (*5)

Example:, (*6)

            59 => array(
               'class' => 'attributeaggregator:attributeaggregator',
               'entityId' => 'https://aa.example.com:8443/aa',

              /**
               * The subject of the attribute query. Default: urn:oid:1.3.6.1.4.1.5923.1.1.1.6 (eduPersonPrincipalName)
               */
               //'attributeId' => 'urn:oid:1.3.6.1.4.1.5923.1.1.1.6',

               /** 
                * If set to TRUE, the module will throw an exception if attributeId is not found.
                */
               // 'required' => FALSE,

               /** 
                * The format of attributeId. Default is 'urn:oasis:names:tc:SAML:2.0:nameid-format:persistent'
                */
               //'nameIdFormat' => 'urn:oasis:names:tc:SAML:2.0:nameid-format:persistent',


               /**
                * The name Format of the attribute names.
                */
               //'attributeNameFormat' => 'urn:oasis:names:tc:SAML:2.0:attrname-format:uri',

               /**
                * The requested attributes. If not present, we will get all
                * the attributes. The keys of the array is the attribute name in (''urn:oid'') format.
                * values:
                *   the array of acceptable values. If not defined, the filter will accept all values.
                * multiSource:
                *   merge:    merge the existing and the new values, this is the default behaviour,
                *   override: drop the existing values and set the values from AA,
                *   keep:     drop the new values from AA and keep the original values.
                */
               // 'attributes' => array(
               //         "urn:oid:attribute-OID-1" => array (
               //               "values" => array ("value1", "value2"),
               //               "multiSource" => "override"
               //               ),
               //         "urn:oid:attribute-OID-2" => array (
               //               "multiSource" => "keep"
               //               ),
               //         "urn:oid:attribute-OID-3" => array (
               //               "values" => array ("value1", "value2"),
               //               ),
               //         "urn:oid:attribute-OID-4" => array ()
               //        ),

            ),

You have to define PAOS acs endpoint with correct Location (take a look on VIRTUAL_HOST env variable), if the AA is a simpleSAMLphp implementation with simplesamlphp-module-aa, (*7)

authsources.php in the current sp array, ie. default-sp, (*8)

        'AssertionConsumerService' => [
          [
            'index' => 0,
            'isDefault' => true,
            'Location' => 'https://' . getenv('VIRTUAL_HOST') . '/simplesaml/module.php/saml/sp/saml1-acs.php/default-sp',
            'Binding' => 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST',
          ],
          [
            'index' => 1,
            'Location' => 'https://' . getenv('VIRTUAL_HOST') . '/simplesaml/module.php/saml/sp/saml1-acs.php/default-sp',
            'Binding' => 'urn:oasis:names:tc:SAML:2.0:bindings:PAOS',
          ],
        ],

Options

The following options can be used when configuring the '''attributeaggregation''' module, (*9)

entityId
The entityId of the Attribute Authority. The metadata of the AA must be in the attributeauthority-remote metadata set, otherwise you will get an error message.
attributeId
This is the Subject in the issued AttributeQuery. The attribute must be previously resolved by an authproc module. The default attribute is urn:oid:1.3.6.1.4.1.5923.1.1.1.6 (eduPersonPrincipalName).
attributeNameFormat
The format of the NameID in the issued AttributeQuery. The default value is urn:oasis:names:tc:SAML:2.0:attrname-format:uri.
attributes
You can list the expected attributes from the Attrubute Authority in the attributes array. The array contains key-value pairs, where the keys are attribute names in full federated (''urn:oid'') format and the values are arrays with the expected values for that attribute. If the value is an empty array, all the values of the attributes are resolved, otherwise only the matching ones. If the attributes option is not defined, every attribute is resolved from the response from the AA.

The Versions

17/04 2018

dev-master

9999999-dev

Attribute Aggregator implementation or SAML AttributeQuery

  Sources   Download

The Requires

 

The Development Requires

05/12 2017

2.x-dev

2.9999999.9999999.9999999-dev

Attribute Aggregator implementation or SAML AttributeQuery

  Sources   Download

The Requires

 

The Development Requires

05/12 2017

v2.0.0-rc2

2.0.0.0-RC2

Attribute Aggregator implementation or SAML AttributeQuery

  Sources   Download

The Requires

 

The Development Requires

05/12 2017

v2.0.0-rc1

2.0.0.0-RC1

Attribute Aggregator implementation or SAML AttributeQuery

  Sources   Download

The Requires

 

The Development Requires

30/11 2017

v1.0.8

1.0.8.0

Attribute Aggregator implementation or SAML AttributeQuery

  Sources   Download

The Requires

 

The Development Requires

30/11 2017

v1.0.7

1.0.7.0

Attribute Aggregator implementation or SAML AttributeQuery

  Sources   Download

The Requires

 

The Development Requires

29/11 2017

v1.0.6

1.0.6.0

Attribute Aggregator implementation or SAML AttributeQuery

  Sources   Download

The Requires

 

The Development Requires

15/08 2017

v1.0.5

1.0.5.0

Attribute Aggregator implementation or SAML AttributeQuery

  Sources   Download

The Requires

 

The Development Requires

23/01 2017

v1.0.4

1.0.4.0

Attribute Aggregator implementation or SAML AttributeQuery

  Sources   Download

The Requires

 

The Development Requires

27/05 2015

v1.0.3

1.0.3.0

Attribute Aggregator implementation or SAML AttributeQuery

  Sources   Download

The Requires

 

19/03 2015

v1.0.2

1.0.2.0

Attribute Aggregator implementation or SAML AttributeQuery

  Sources   Download

The Requires

 

21/01 2015

v1.0.1

1.0.1.0

Attribute Aggregator implementation or SAML AttributeQuery

  Sources   Download

The Requires

 

12/11 2014

v1.0

1.0.0.0

Attribute Aggregator implementation or SAML AttributeQuery

  Sources   Download

The Requires